Wonder Club world wonders pyramid logo
×

Hiding in plain sight Book

Hiding in plain sight
Hiding in plain sight, <ul>
<li>Explains exactly what steganography is-hiding a message inside an innocuous picture or music file-and how it has become a popular tool for secretly sending and receiving messages for both the good guys and the bad guys</li>
<li>First book to desc, Hiding in plain sight has a rating of 4.5 stars
   2 Ratings
X
Hiding in plain sight,
  • Explains exactly what steganography is-hiding a message inside an innocuous picture or music file-and how it has become a popular tool for secretly sending and receiving messages for both the good guys and the bad guys
  • First book to desc, Hiding in plain sight
    4.5 out of 5 stars based on 2 reviews
5
50 %
4
50 %
3
0 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • Hiding in plain sight
  • Written by author Eric Cole
  • Published by New York : Wiley Pub., c2003., 2003/04/25
  • Explains exactly what steganography is-hiding a message inside an innocuous picture or music file-and how it has become a popular tool for secretly sending and receiving messages for both the good guys and the bad guys First book to desc
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

Acknowledgments xiii
Introduction xvii
Part 1 Exploring the World of Covert Communication 1
Chapter 1 Covert Communication: It's All Around You 3
What Is Steganography? 5
Where Hidden Data Hides 5
Where Did It Come From? 6
Where Is It Going? 7
When Steganography Inspires Terror 8
Who Is Using Stego? 9
Protecting Your Rights 10
Keeping Your Business Secure 10
Looking Ahead 12
Chapter 2 Cryptography Explained 13
Cryptography Defined 15
Crypto 101 15
Crypto Lingo 16
Early Cryptography 17
How We Got to Modern Cryptography 18
Cryptography and Network Security 19
Confidentiality 19
Integrity 20
Availability 21
Authentication and Non-Repudiation 22
Authentication 22
Non-repudiation 23
Principles of Cryptography 24
You Cannot Prove Crypto Is Secure 24
Algorithm versus Implementation 25
Never Trust Proprietary 26
The Strength of an Algorithm Is in the Key 28
Cryptography Stays in Place 28
Cryptography Must Be Designed In 29
All Cryptography Is Crackable, in Time 29
Security Becomes Obsolete 31
Types of Cryptography 32
Symmetric 32
Diffie-Hellman Key Exchange 32
Common Implementations of Symmetric Encryption 34
Asymmetric 38
Hash 38
Putting the Pieces Together 39
Using Cryptography Tools 40
Working with PGP 41
Generating a Privacy Key with PGP 41
How PGP Works with Email 44
Using SSH 45
Looking Ahead 50
Chapter 3 Hiding the Goods with Steganography 51
Overview of Steganography 52
The Growth of Steganography 53
Steganography in Use 54
Flaws of Steganography 55
Variations on Stego 56
Trojan Horses 56
Covert Channels 57
Easter Eggs 58
Hardware Keys 58
Security and Steganography 59
Confidentiality 59
Survivability 59
No Detection 60
Visibility 60
Principles of Steganography 61
Types of Steganography 61
File Type 61
Method of Hiding 62
Hands-on Steganography 62
Putting All the Pieces Together 63
Looking Ahead 66
Chapter 4 Digital Watermarking 67
What Is Digital Watermarking? 68
Exploring Uses for Digital Watermarking 69
Properties of Digital Watermarking 71
Types of Digital Watermarking 73
Invisible Watermarking 74
Visible Watermarking 77
Goals of Digital Watermarking 78
Digital Watermarking and Stego 79
Uses of Digital Watermarking 80
Removing Digital Watermarks 81
Looking Ahead 87
Part 2 The Hidden Realm of Steganography 89
Chapter 5 Steganography at Large 91
The Internet: A Climate for Deceit 93
The End of the Paper Trail 93
Your Jurisdiction or Mine? 94
Searching for Identity 95
Corporate Espionage 97
Who's Playing? 97
Information Attacks 98
System Attacks 99
Playing Spy 99
Big Brother--With an Attitude 99
Information Crime and the Law 101
Who's Watching Whom? 101
Protecting Ideas 101
Enforcement: A Tough Nut 102
The Challenge 103
Enforcing the Unenforceable 103
The Growing Science of Computer Forensics 104
Looking Ahead 105
Chapter 6 Nuts and Bolts of Steganography 107
Types of Steganography 108
Original Classification Scheme 109
Insertion-Based 109
Algorithmic-Based 109
Grammar-Based 110
New Classification Scheme 111
Insertion-Based 111
Substitution-Based 112
Generation-Based 112
Color Tables 113
Products That Implement Steganography 114
S-Tools 115
Using S-Tools with Image Files 115
Using S-Tools with Sound Files 116
S-Tools Step-by-Step 117
Hide and Seek 118
J-Steg 119
EZ Stego 121
Image Hide 122
Digital Picture Envelop 123
Camouflage 126
Gif Shuffle 127
Spam Mimic 127
Rolling Your Own Stego 129
Comprehensive Stego Program 130
Technique Structure 132
WAV Creation 132
Overview 132
Idea 133
Details 133
Logic Flow 134
Areas for Improvement 135
wav-Sine Creation 135
Overview 135
Idea 135
Details 135
Logic Flow 135
Areas for Improvement 136
WAV Twiddle 137
Overview 137
Idea 137
Details 137
Logic Flow 137
Areas for Improvement 139
Doc Stuffer 139
Overview 139
Idea 139
Details 139
Logic Flow 140
Areas for Improvement 141
EXE Stuffer 141
Overview 142
Idea 143
Details 143
Logic Flow 143
Areas for Improvement 143
HTML White Space 144
Overview 145
Idea 145
Details 145
Logic Flow 147
Areas for Improvement 147
HTML White Space Variable 147
Overview 147
Idea 148
Details 149
Logic Flow 149
Areas for Improvement 149
RTF Insertion 149
Overview 149
Idea 150
Details 151
Logic Flow 151
Areas for Improvement 151
War 151
Overview 151
Idea 151
Details 152
Logic Flow 153
Areas for Improvement 153
Looking Ahead 153
Chapter 7 Sending Stego Files Across a Network 155
Uses and Techniques of Network Stego 155
Hiding in Network Traffic 156
Stego Combined with Viruses 156
Tracking Internet Usage 156
Network Stego Techniques 157
Hiding in an Attachment 157
Hiding Data in an Email Attachment 157
Transmitting Hidden Data with FTP 157
Posting Stego to a Web Site 158
Hiding in a Transmission 158
Using Invisible Secrets to Hide and Transmit Data 158
Embedding Hidden Data with Invisible Secrets 159
Decrypting and Extracting Data with Invisible Secrets 164
CameraShy 167
Hiding Data in Network Headers 169
Networking and TCP/IP: The Basics 169
Using IP and TCP Headers for Stego 169
UDP and ICMP Headers 171
Covert TCP 171
How Covert TCP Works 172
Running Covert TCP 173
Hiding in an Overt Protocol 179
Looking Ahead 181
Part 3 Making Your Own Communications Secure 183
Chapter 8 Cracking Stego and Crypto 185
Who's Cracking What? 186
Cracking Analysis 187
Cryptanalysts 187
Steganalysts 188
The Role of Detection 188
Detecting Encryption 188
Randomness and Compression 190
Detection and Image Files 190
Building a Program for Detection 191
Cracking Cryptography 194
General Attacks 195
Ciphertext-Only Attack (COA) 195
Known Plaintext Attack (KPA) 196
Chosen Plaintext Attack (CTA) 197
Chosen Ciphertext Attack (CCA) 197
Specific Attacks 197
Brute-Force Attack 197
Replay Attack 198
Man-in-the-Middle Attack 199
Meet-in-the-Middle Attack 199
Birthday Attack 200
Cracking Steganography 201
Specific Techniques 201
S-Tools Version 4.0 202
Hide and Seek 205
J-Steg 205
EZ Stego 207
StegDetect 208
General Techniques for Detecting Stego 211
Looking Ahead 216
Chapter 9 Developing Your Secure Communications Strategy 217
Secure versus Secret 218
Setting Communication Goals 219
The Roles of Crypto and Stego in Business 220
Why You Need Both Stego and Crypto 220
Crypto and Stego in Business Today

Title:    Hiding in plain sight

Manufacturer:

Wiley

Wiley

Item Number: 9780471444497

Number: 1

Product Description: Hiding in plain sight

Universal Product Code (UPC): 9780471444497

WonderClub Stock Keeping Unit (WSKU): 9780471444497

Rating: 4.5/5 based on 2 Reviews

Image Location: https://wonderclub.com/images/covers/44/97/9780471444497.jpg

Category: Media >> Books

Weight: 0.200 kg (0.44 lbs)

Width: 7.380 cm (2.91 inches)

Heigh : 9.220 cm (3.63 inches)

Depth: 0.780 cm (0.31 inches)

Date Added: August 25, 2020, Added By: Ross

Date Last Edited: August 25, 2020, Edited By: Ross


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Hiding in plain sight, <ul>
<li>Explains exactly what steganography is-hiding a message inside an innocuous picture or music file-and how it has become a popular tool for secretly sending and receiving messages for both the good guys and the bad guys</li>
<li>First book to desc, Hiding in plain sight

X
WonderClub Home

This item is in your Collection

Hiding in plain sight, <ul>
<li>Explains exactly what steganography is-hiding a message inside an innocuous picture or music file-and how it has become a popular tool for secretly sending and receiving messages for both the good guys and the bad guys</li>
<li>First book to desc, Hiding in plain sight

Hiding in plain sight

X
WonderClub Home

This Item is in Your Inventory

Hiding in plain sight, <ul>
<li>Explains exactly what steganography is-hiding a message inside an innocuous picture or music file-and how it has become a popular tool for secretly sending and receiving messages for both the good guys and the bad guys</li>
<li>First book to desc, Hiding in plain sight

Hiding in plain sight

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: